Author of the publication

Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation.

, , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 463-493. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors., and . ICETE (2), page 522-529. SciTePress, (2018)Efficient Adaptive Oblivious Transfer Without q-type Assumptions in UC Framework., and . ICICS, volume 8958 of Lecture Notes in Computer Science, page 105-119. Springer, (2014)Improved Self-Healing Key Distribution with Revocation in Wireless Sensor Network., and . WCNC, page 2963-2968. IEEE, (2007)Strongly full-hiding inner product encryption., , and . Theor. Comput. Sci., (2017)Functional Encryption for Inner Product with Full Function Privacy., , and . Public Key Cryptography (1), volume 9614 of Lecture Notes in Computer Science, page 164-195. Springer, (2016)A deterministic key pre-distribution scheme for WSN using projective planes and their complements., , and . Int. J. Trust. Manag. Comput. Commun., 2 (2): 150-184 (2014)Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption., and . IACR Cryptol. ePrint Arch., (2020)Enhanced Access Polynomial Based Self-healing Key Distribution., , and . SEWCN, volume 42 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 13-24. Springer, (2009)Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications., and . IACR Cryptol. ePrint Arch., (2020)Converting Group Key Agreement Protocol into Password-Based Setting - Case Study.. J. Comput., 2 (8): 26-33 (2007)